Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Efficient Cybersecurity Assessment Using SVM and Fuzzy Evidential Reasoning for Resilient Infrastructure
https://iieta.org/sites/default/files/pdf/2024-05/isi_29.02_12.pdf
3D Human Facial Traits’ Analysis for Ethnicity Recognition Using Deep Learning
https://iieta.org/sites/default/files/pdf/2024-04/isi_29.02_11.pdf
GLAD: Advanced Attention Mechanism-Based Model for Grape Leaf Disease Detection
https://iieta.org/sites/default/files/pdf/2024-05/isi_29.02_30_0.pdf
Predicting Transport Mode in the Rabat Region: A Machine Learning Approach
https://iieta.org/sites/default/files/pdf/2024-05/isi_29.02_10_1.pdf
Review of Android Apps for Monitoring Pregnancy Symptoms and Care
https://iieta.org/sites/default/files/pdf/2024-04/isi_29.02_24.pdf
Automatic Hindi OCR Error Correction Using MLM-BERT
https://iieta.org/sites/default/files/pdf/2024-05/isi_29.02_23_1.pdf
COVID-19 Pandemic Impact on E-Learning Adoption and Its Utilization at Higher Education: A Comparative Analysis of Institutions and Students' Perspectives
https://iieta.org/sites/default/files/pdf/2024-05/isi_29.02_06_0.pdf
Sentiment Analysis: Classifying Public Comments on YouTube in Disaster Management Simulation in Indonesia Using Naïve Bayes and Support Vector Machine
https://iieta.org/sites/default/files/pdf/2024-05/isi_29.02_05.pdf
Predicting Alzheimer's Disease Using a Modified Grey Wolf Optimizer and Support Vector Machine
https://iieta.org/sites/default/files/pdf/2024-04/isi_29.02_28.pdf
Deep Learning-Enhanced Cluster Head Optimization for Intrusion Detection in Wireless Sensor Networks
https://iieta.org/sites/default/files/pdf/2024-04/isi_29.02_22_0.pdf
Pages
« first
‹ previous
…
167
168
169
170
171
172
173
174
175
…
next ›
last »